Re: Running code (Was: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt)

Fernando Gont <fgont@si6networks.com> Thu, 25 October 2018 23:47 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAC0D12F1A5 for <ipv6@ietfa.amsl.com>; Thu, 25 Oct 2018 16:47:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.357
X-Spam-Level:
X-Spam-Status: No, score=-0.357 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DATE_IN_PAST_06_12=1.543, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jtV5_kmyqPCi for <ipv6@ietfa.amsl.com>; Thu, 25 Oct 2018 16:47:26 -0700 (PDT)
Received: from fgont.go6lab.si (fgont.go6lab.si [91.239.96.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 879A0130DC7 for <ipv6@ietf.org>; Thu, 25 Oct 2018 16:47:26 -0700 (PDT)
Received: from [192.168.0.104] (224.red-83-41-246.dynamicip.rima-tde.net [83.41.246.224]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 1FDDD873A9; Fri, 26 Oct 2018 01:47:22 +0200 (CEST)
Subject: Re: Running code (Was: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt)
To: Mark Andrews <marka@isc.org>
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, Lee Howard <lee@asgard.org>, ipv6@ietf.org
References: <CAFU7BASO_ByzbanhLKnWV280O_fASd-8W+ujpj3sN6d2-whw2w@mail.gmail.com> <3beca72e-19c5-10af-02e5-c21a90d77100@gmail.com> <20181019.223739.271916573.sthaug@nethelp.no> <4f58643c-272e-507e-3282-c87befd42395@gmail.com> <0927741c-4e8e-fcf7-ddd6-3ba500ba4c3d@si6networks.com> <7B48A11D-31DE-443C-B73A-14642EA0A397@jisc.ac.uk> <7526af75-4359-6fc6-e39b-eb94024a04de@si6networks.com> <E1BB1232-C1A2-496A-8157-0682D91EED42@steffann.nl> <5E75F3CA-F1D2-4F4F-9CF7-EEEE59634C1E@gmail.com> <C46C990E-0A4F-4731-8CB1-FD204858935E@consulintel.es> <9B53019C-3506-4C9E-AFCF-D6125FA1A65B@gmail.com> <1157b739-3a66-8d45-e3e1-e5f904dfb9bc@asgard.org> <a00607f9-7ced-f889-b5cb-c2fe16367d73@si6networks.com> <66759b73-0a22-e1a9-49db-21154e8e1267@gmail.com> <37ba23b3-df19-9c2a-bdbe-ba7a99d72d05@si6networks.com> <0d6008a4-337b-2ccb-2d9f-837f786eca65@gmail.com> <bfa4397a-aa7a-1184-4147-4cbfbfd13603@si6networks.com> <8C587906-F0EE-4A61-9046-2BFAC52588C0@isc.org>
From: Fernando Gont <fgont@si6networks.com>
Openpgp: preference=signencrypt
Autocrypt: addr=fgont@si6networks.com; prefer-encrypt=mutual; keydata= xsFNBE5so2gBEACzBQBLUy8nzgAzSZn6ViXT6TmZBFNYNqTpPRvTVtUqF6+tkI+IEd9N2E8p pXUXCd0W4dkxz6o7pagnK63m4QSueggvp881RVVHOF8oTSHOdnGxLfLeLNJFKE1FOutU3vod GK/wG/Fwzkv9MebdXpMlLV8nnJuAt66XGl/lU1JrNfrKO4SoYQi4TsB/waUQcygh7OR/PEO0 EttiU8kZUbZNv58WH+PAj/rdZCrgUSiGXiWUQQKShqKnJxLuAcTcg5YRwL8se/V6ciW0QR9i /sr52gSmLLbW5N3hAoO+nv1V/9SjJAUvzXu43k8sua/XlCXkqU7uLj41CRR72JeUZ4DQsYfP LfNPC98ZGTVxbWbFtLXxpzzDDT8i3uo7w1LJ2Ij/d5ezcARqw01HGljWWxnidUrjbTpxkJ9X EllcsH94mer728j/HKzC9OcTuz6WUBP3Crgl6Q47gY5ZIiF0lsmd9/wxbaq5NiJ+lGuBRZrD v0dQx9KmyI0/pH2AF8cW897/6ypvcyD/1/11CJcN+uAGIrklwJlVpRSbKbFtGC6In592lhu7 wnK8cgyP5cTU+vva9+g6P1wehi4bylXdlKc6mMphbtSA+T3WBNP557+mh3L62l4pGaEGidcZ DLYT2Ud18eAJmxU3HnM8P3iZZgeoK7oqgb53/eg96vkONXNIOwARAQABzSVGZXJuYW5kbyBH b250IDxmZ29udEBzaTZuZXR3b3Jrcy5jb20+wsGBBBMBAgArAhsjBQkSzAMABgsJCAcDAgYV CAIJCgsEFgIDAQIeAQIXgAUCTmylpQIZAQAKCRCuJQ1VHU50kv7wD/9fuNtTfxSLk3B3Hs3p ixTy8YXVjdkVwWlnJjFd7BOWmg7sI+LDhpjGfT6+ddOiwkumnvUZpObodj4ysH0i8c7P4C5t F9yu7WjklSlrB5Rth2CGChg5bKt541z2WHkFFxys9qBLmCSYDeKQkzLqhCjIUJizY2kOJ2GI MnSFDzJjhSFEh//oW830Y8fel1xnf/NVF+lBVtRMtMOfoWUqDjvP3sJ1G4zgkDCnF0CfncLx +hq2Mv26Uq9OTzvLH9aSQQ/f067BOkKAJKsfHdborX4E96ISTz57/4xECRSMr5dVsKVm4Y// uVIsb+L5z+a32FaiBZIAKDgnJO7Z8j6CV5e5yfuBTtX52Yi9HjYYqnYJGSDxYd6igD4bWu+7 xmJPHjkdqZgGV6dQIgiUfqkU+s5Cv350vK48CMaT/ZLo2BdsMhWsmaHmb+waePUMyq6E4E9x 9Js+EJb9ZiCfxS9exgieZQpet1L36IvhiwByvkQM009ywfa30JeMOltUtfLi5V06WQWsTzPL 5C+4cpkguSuAJVDTctjCA0moIeVDOpJ8WH9voQ4IeWapQnX35OIoj1jGJqqYdx65gc1ygbyx b8vw+pJ9E5GLse5TQnYifOWpXzX9053dtbwp/2OVhU4KLlzfCPCEsoTyfu9nIZxdI2PMwiL5 M85BfjX4NmwBLmPGoM7BTQRObKNoARAAqqXCkr250BchRDmi+05F5UQFgylUh10XTAJxBeaQ UNtdxZiZRm6jgomSrqeYtricM9t9K0qb4X2ZXmAMW8o8AYW3RrQHTjcBwMnAKzUIEXXWaLfG cid/ygmvWzIHgMDQKP+MUq1AGQrnvt/MRLvZLyczAV1RTXS58qNaxtaSpc3K/yrDozh/a4pu WcUsVvIkzyx43sqcwamDSBb6U8JFoZizuLXiARLLASgyHrrCedNIZdWSx0z0iHEpZIelA2ih AGLiSMtmtikVEyrJICgO81DkKNCbBbPg+7fi23V6M24+3syHk3IdQibTtBMxinIPyLFF0byJ aGm0fmjefhnmVJyCIl/FDkCHprVhTme57G2/WdoGnUvnT7mcwDRb8XY5nNRkOJsqqLPemKjz kx8mXdQbunXtX9bKyVgd1gIl+LLsxbdzRCch773UBVoortPdK3kMyLtZ4uMeDX3comjx+6VL bztUdJ1Zc9/njwVG8fgmQ+0Kj5+bzQfUY+MmX0HTXIx3B4R1I1a8QoOwi1N+iZNdewV5Zfq+ 29NlQLnVPjCRCKbaz9k6RJ2oIti55YUI6zSsL3lmlOXsRbXN5bRswFczkNSCJxJMlDiyAUIC WOay7ymzvgzPa+BY/mYn94vRaurDQ4/ljOfj6oqgfjts+dJev4Jj89vp8MQI3KJpZPEAEQEA AcLBZQQYAQIADwUCTmyjaAIbDAUJEswDAAAKCRCuJQ1VHU50km4xEACho45PZrUjY4Zl2opR DFNo5a6roTOPpgwO9PcBb3I5F8yX2Dnew+9OhgWXbBhAFq4DCx+9Gjs43Bn60qbZTDbLGJ/m 8N4PwEiq0e5MKceYcbetEdEUWhm5L6psU9ZZ82GR3UGxPXYe+oifEoJjOXQ39avf9S8p3yKP Diil0E79rn7LbJjMcgMLyjFg9SDoJ6pHLtniJoDhEAaSSgeV7Y745+gyMIdtQmrFHfqrFdjq D6G0HE+Z68ywc5KN67YxhvhBmSycs1ZSKAXv1zLDlXdmjHDHkU3xMcB+RkuiTba8yRFYwb/n j62CC4NhFTuIKOc4ta3dJsyXTGh/hO9UjWUnmAGfd0fnzTBZF8Qlnw/8ftx5lt4/O+eqY1EN RITScnPzXE/wMOlTtdkddQ+QN6xt6jyR2XtAIi7aAFHypIqA3lLI9hF9x+lj4UQ2yA9LqpoX 6URpPOd13JhAyDe47cwsP1u9Y+OBvQTVLSvw7Liu2b4KjqL4lx++VdBi7dXsjJ6kjIRjI6Lb WVpxe8LumMCuVDepTafBZ49gr7Fgc4F9ZSCo6ChgQNLn6WDzIkqFX+42KuHz90AHWhuW+KZR 1aJylERWeTcMCGUSBptd48KniWmD6kPKpzwoMkJtEXTuO2lVuborxzwuqOTNuYg9lWDl7zKt wPI9brGzquUHy4qRrA==
Message-ID: <1089edd4-d9e9-06f8-8368-b57bf02a05bb@si6networks.com>
Date: Thu, 25 Oct 2018 18:51:29 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1
MIME-Version: 1.0
In-Reply-To: <8C587906-F0EE-4A61-9046-2BFAC52588C0@isc.org>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/c51Z_aGnkQQtbRCxc8B3OKCfkCs>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Oct 2018 23:47:29 -0000

On 10/25/18 2:15 AM, Mark Andrews wrote:
> 
>> On 25 Oct 2018, at 8:38 am, Fernando Gont <fgont@si6networks.com> wrote:
>>
>> On 10/24/18 9:54 PM, Brian E Carpenter wrote:
>>> On 2018-10-24 16:20, Fernando Gont wrote:
>>>> On 10/24/18 4:54 AM, Brian E Carpenter wrote:
>>>>> On 2018-10-24 11:13, Fernando Gont wrote:
>>>>>
>>>>> <snip>
>>>>>
>>>>>>
>>>>>> In this particular case (ipv6-only flag), what goes on the wire is
>>>>>> simple enough that..I don't think having an implementation will buy much
>>>>>> wrt how different implementations interoperate with each other. And the
>>>>>> insights you'll gain from an implementation are most likely "out of the
>>>>>> scope of the I-D", since how you disable the IPv4 stack is certainly
>>>>>> going to be very implementation-dependent. (me thinking out loud)
>>>>>>
>>>>>
>>>>> Exactly right. There isn't actually an interop requirement of any kind.
>>>>> This is a one-way signal from the routers to each host, and each host
>>>>> may choose what to do with that information. Legacy hosts will ignore
>>>>> it, for example. A host with a sophisticated connection manager might
>>>>> use a complicated heuristic, and there are many possibilities in
>>>>> between, which is the reason that the draft uses SHOULD language.
>>>>
>>>> Without endorsing or opposing to the proposal what I would expect is
>>>> that it's quite clear what is expected from hosts in response to the bit.
>>>>
>>>> If, when sending the bit set you get each node doing it's own thing (one
>>>> reduces timers, another disables the stack forever, another disables it
>>>> but might re-enable it when the bit is no longer set, etc.), that would
>>>> be an undesirable outcome. Me, I think it should be clear what to do
>>>> with the bit, and the exceptions (the corner cases when you might go
>>>> against the advice) should be spelled out.
>>>
>>> That's exactly the reason for using an RFC2119 SHOULD - but spelling out
>>> all the corner cases seems like an impossible task.
>>
>> I'd expect that, say, you spell out the cases that made you use "SHOULD"
>> rather than "MUST". Put another way: what are the scenarios that you
>> have already envisioned where hosts shouldn't disable the IPv4 stack?
> 
> When you as the administrator of the host know that the administrator of
> router erred.

Administrator of the host? You must be operating in a different
environment? I'd bet the closest thing to "admnistrator" in a growing
and growing number of nodes is the app doing automated updates.



> When you as the administrator of the host configure the host to only talk
> to a subset of otherwise reachable machines over IPv4.
> 
> When you as a administrator of the host want to test something.

Same as above.



>> If I had to code the host part, for example, I'd wonder: Should I
>> disable IPv4 for mDNS? If the network is marked as IPv6-only does it
>> meant that I shouldn't even try to find, say, a network printer using
>> IPv4 link-local addresses (169…)?
> 
> Yes.  The assumption when the flag is set is that all the boxes are IPv6
> capable.

...and apps.

In which case, make the "SHOULD" a "MUST", and put an applicability
statement noting that.


> 
>> Putting this mechanism (ipv6-only flag), I am not sure the extent to
>> which you might want to disable IPv4 completely. For instance, there are
>> networks that, whether we like it or not, end up learning the RDNS
>> address via DHCPv4, because e.g. they employ a version of MS Windows
>> that predates W10.
> 
> If I was implementing it the interface would become un-numbered for IPv4,
> the DHCP client would be disabled, mDNS would not be attempted over IPv4.
> 
> I might gate that decision on whether there is a working IPv4 lease or not
> (see SHOULD).

I would like that there is less of "I would", "I might" with "MUSTs" in
the spec.



>> Or the network might not use IPv6 itself, but nodes might need IPv4 for
>> "peer to peer" stuff withing the network (whether transferring files,
>> printing documents, etc.). And those services are not provide by "the
>> network", so the networrk admin doesn't have much of a say about them
>> (i.e., he/she might not even know about apps that might require IPv4).
> 
> Then the network is not IPv6-only and you shouldn’t be setting the flag.

It depends what you mean by "the network". Only stuff that yu the net
admin runs? Does it also include nodes you don't control? If the later,
than "you never know".


-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492